cve/2023/CVE-2023-34062.md

21 lines
952 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-34062](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34062)
![](https://img.shields.io/static/v1?label=Product&message=Reactor%20Netty&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.1.0%3C%201.1.13%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Directory%20Traversal%20&color=brighgreen)
### Description
In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack.Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/chainguard-dev/pombump
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/tanjiti/sec_profile
- https://github.com/vaikas/pombump